2021
DOI: 10.48550/arxiv.2108.05742
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound

Abstract: Consider the problem of designing secure and private codes for distributed matrix-matrix multiplication. A master server owns two private matrices A and B and hires worker nodes to help computing their multiplication. The matrices should remain information-theoretically private from the workers. Some of the workers are malicious and return corrupted results to the master. This work is motivated by the literature on myopic adversaries in network coding and distributed storage. Security beyond the Singleton boun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…At the other extreme, when the algorithm terminates at the very end when X = F N , then the corresponding code will be the standard ρ-covering code (see Appendix B), and the computation cost will correspond to γ = H −1 q (K/N ). 17 Here it is worth elaborating on a fine point regarding our metric. As the reader may recall, γ describes the fraction of active (non-idle) servers that compute any subfunction.…”
Section: Appendix C Proof Of Corollarymentioning
confidence: 99%
“…At the other extreme, when the algorithm terminates at the very end when X = F N , then the corresponding code will be the standard ρ-covering code (see Appendix B), and the computation cost will correspond to γ = H −1 q (K/N ). 17 Here it is worth elaborating on a fine point regarding our metric. As the reader may recall, γ describes the fraction of active (non-idle) servers that compute any subfunction.…”
Section: Appendix C Proof Of Corollarymentioning
confidence: 99%